期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model 被引量:2
1
作者 Xie Xiao-yao 1,2 , Zhang Huan-guo 1 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2. Institute of Network Technology, Guizhou University of Technology, Guiyang 550003, Guizhou, China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第3期293-295,共3页
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze th... The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze the transaction protocols in the application of electronic commerce. Key words finite automaton - electronic commerce - nonrepudiation - information security CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (66973034, 90104005, 60373087)Biography: Xie Xiao-yao (1952-), male, Professor, Ph. D candidate, research direction: information security. 展开更多
关键词 finite automaton electronic commerce nonrepudiation information security
下载PDF
Convertible Proxy Signcryption Scheme 被引量:1
2
作者 李继国 李建中 +1 位作者 曹珍富 张亦辰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第2期209-213,共5页
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed... In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature. However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme. 展开更多
关键词 proxy signcryption nonrepudiation digital signature proxy signature
下载PDF
Improvement of M-U-O and K-P-W proxy signature schemes 被引量:10
3
作者 李继国 曹珍富 张亦辰 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2002年第2期145-148,共4页
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes... The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes does not support nonrepudiation. In this paper, we propose two secure nonrepudiable proxy signature schemes, which overcome disadvantages of M U O and K P W proxy signature schemes, respectively. The schemes proposed can withstand public key substitution attack and forge attack. In addition, our new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. Our approach can also be applied to other ElGamal like proxy signature schemes. 展开更多
关键词 nonrepudiable DIGITAL SIGNATURE PROXY SIGNATURE MULTI-SIGNATURE
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部